I read that thread but it’s not clear exactly what installation the guy was referring to - my impression is that he installed software out-of-the-box and then critiqued it ... it does not appear the things he references were actually from a Dominion computer and I’m still unsure what role the web page (that did have a link on the bottom of the page and javascript left in the html header) played and these seem to be discreet things in the guy’s analysis. I’m not surprised to see outdated libraries and things - it’s common with election systems, since it takes time to get certified and boards were, historically, cheap to pay for upgrades & things ... that software will prove out of date and comprise components with known defects and vulnerabilities; what role each may play is unknown here i.e. a buffer overwrite potential along the lines of one critique in thread may or may not be an exploit (sometimes are targetable, other times not). In any event, systems such as these should be well hardened and the kinds of analysis tools the writer describes should certainly be run against such systems regularly and is inexcusable to have any exploits during an election lest the results be called into question (duh lol). IMO lol. TBD + WWG1WGA :)
I sent this to two friends that are programmers by profession. I will hold my comments until i hear from them.
I'm going to ask to delete that page.
Post #1669 which you are replying to here was pulled.
Who is the guy who was talking in that post?
I found something potentially interesting but don’t want to re-post already-removed, and suspect, info?